kali operating system LINUX UNIX MAC Window presentation ubanto MAC KAli features compare of kali and unix in hindi easy present ppt slideshare tolls hacking penetration ethical hacking KALI top ten feature best hacking tool
6. Definition
Kali Linux is an operating system
Use for advanced Penetration Testing and Security Auditing
Named on Hindu god.
It was designed to replace the BackTrack Linux
8. Mati Aharoni
Kali Linux Core Developers Mati Aharoni is the
lead Kali developer, trainer and founder of
Offensive Security. With over 10 years of
experience as a professional penetration tester, he
has uncovered several major security flaws and is
actively involved in the offensive security area.
Founders of Kali Linux
9. Devon Kearns
Devon Kearns (dookie) is an Offensive Security
instructor, Kali Linux developer, the administrator
of the Exploit Database, co-creator of the
Metasploit Unleashed project, fanatic, and co-
author of Penetration Tester’s Guide
10. Offensive security
Offensive Security is an organization that offers
Offensive Security certification Professional
(OSCP) is an ethical hacking certification that
teaches penetration testing for organization.
11. Hardware requirement
• A minimum of 20 GB disk space for the Kali
Linux install.
• RAM for i386 and amd64
architectures, minimum: 1GB, recommended
2GB or more.
• CD-DVD Drive / USB boot support
12. Installation of Kali
STEP 1 : Boot with your chosen medium or load the Kali
STEP 2 : Select your preferred language
STEP 3 : Select your geographical location
STEP 4 : Select the preferred keyboard
STEP 5 : Let kali be your hostname & hit continue
STEP 6 : Set a password for your Kali Machine & hit continue
13. Installation of Kali
STEP 7 : set your time zone.
STEP 8 : partitions of the disk.
STEP 9 : Configure network mirrors( it is use to supplement the
software that is included on cd room)
STEP 10:install GRUB(places the operating system (OS) of a computer into memory.)
STEP 11: Finally, click ,Continue to reboot into your new
Kali installation
15. Feature of Kali
• Has more than 300 penetration testing tools.
• Multilingual Support
• Completely Customizable.
• Free and Always will be.
• Vast Wireless device support and Compatible
with USB
• ARM support
• Trustable Operating System
• Forensics Mode(recovery and investigation of
data )
16. Metasploit framework
• Metasploit framework best and no1 tool in kali
linux with backdooring attacks. Msf can target any
kind of system including windows, mac, linux,
android and even cctv cameras. Msf can generate
a backdoor and control the infected system with its
handler.
17. SQLmap
• in penetration testing most of the hackers tries to take
down a database in the first place while attacking a
web server. sqlmap is really powerful fully automated
auditing tool for attacking a database by exploiting a
server side sql vulnerability. Sqlmap comes with a
command line interface with cool green fonts.
• You just need to input the vulnerable link rest is fully
automated process
18. Reaver
• Reaver is the best and simple tool for wireless
penetration testing. Reaver targets a WPS
(Wireless protected setup) enabled router.
• This simple tool can crack wifi within a very
short time depending on the wps pin length.
19. Nmap 65535
• Nmap, also known as network mapper is a pretty
simple tool in Kali Linux that allows you to scan a
system or a network. Nmap allows you to scan
open ports, running.
• Nmap uses various type of detection technique to
check IP filters firewalls. Nmap has both command
line interface and GUI and supports almost all
platforms including windows and mac.
20. Hashcat
• Hashcat is an awesome piece of software that can crack
almost any kind of hash. Hashcat has two variants with
two different algorithms one is CPU cracking other one
is GPU cracking. HashCat uses the GPU cracking
algorithm which is very faster than traditional CPU
cracking. Unlike a CPU a GPU has too many number of
cores
21. Aircrack
• Aircrack is not just a tool its toolkit that is used for
wireless attacks or simply hacking a wifi
network. These set of tools allows you to monitor a
network, crack WPA hash, capture handshake.
• The most interesting part is this can be used as a wifi
jammer by sending unlimited false packet to a router
and thus disconnects all the connected devices.
22. Proxychains
• Proxychains is one of the most essential tools in kali
linux. Proxychains directs all traffic of a specific
application through a desired proxy server. Its can mask
the user’s identity and secure the user from
eavesdroppers. By default proxychains is set to connect
through tor proxy servers with more secure protocol
called SOCKS5.
23. Kali Vs. Ubuntu
Kali
Kali Linux is a specialized
distribution.
Kali is purely operate by
professional penetrator
Primarily designed for
purposes like Penetration
Testing and Digital
Forensics.
Developed by Offensive
Security Ltd. and released
on 13th March 2013.
Ubuntu
Ubuntu is a general desktop
and server distribution.
Ubuntu is more friendly to
Linux beginners
Designed to satisfy general
desktop and Server
requirements and also targeted
in some Smart TV’s.
Developed by Canonical Ltd.
and released back in 2004